Skip to content

Internet Salmagundi

  • Home
  • Computing & Technology
  • CyberSecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources
    • – Nielsen Norman Group articles

Computing & Technology

Generally covering the broad topics of computing and related technology.


AI and robotics concept - Chad Hagen
Articles / Computing & Technology

AI’s progress isn’t the same as creating human intelligence in machines

Honorees from this year’s 35 Innovators list are employing AI to find new molecules, fold proteins, and analyze massive amounts of medical data.

AI’s progress isn’t the same as creating human intelligence in machines Read More
map of underwater cable system - TELEGEOGRAPHY
Computing & Technology / Articles

These underwater cables can improve tsunami detection

Telecom companies have long resisted letting scientific sensors piggyback on their subsea cables—until now.

These underwater cables can improve tsunami detection Read More
robots and people in job interview line, illustration - Credit: Getty Images
Computing & Technology / Articles

A Data-Driven Exploration of the Race between Human Labor and Machines in the 21st Century

Technology can automate and substitute for some human tasks, but it can also augment human intelligence and complement specific types of tasks in ways that boost demand for occupations in which those tasks are performed.

A Data-Driven Exploration of the Race between Human Labor and Machines in the 21st Century Read More
code icon and other figures around a display showing three persons, illustration - Credit: MarcoVector
Computing & Technology / Articles

It Takes a Community: The Open Source Challenge

REYNOLD XIN: Open source is not necessarily about free software. Instead, it has more to do with the inherent interest companies have in building ecosystems and communities that will help them lower their cost of hiring new employees and then ramping them up.

It Takes a Community: The Open Source Challenge Read More
bar of blue light, bar of green light, and the word 'progress' - Credit: Andrij Borys Associates, Shutterstock
Computing & Technology / Articles

Toward Justice in Computer Science through Community, Criticality, and Citizenship

Computer science education cannot fix its internal injustices and external harms to society if it aims only to broaden participation. Instead, institutional change is required.

Toward Justice in Computer Science through Community, Criticality, and Citizenship Read More
three-sided figure with sides labeled 'we' and 'they' and 'I' respectively - Credit: Popenkov Dmytr
Computing & Technology / Articles

Information: ‘I’ vs. ‘We’ vs. ‘They’

Assessments concerning privacy can hardly be completely neutral and may underlie some cultural bias.

Information: ‘I’ vs. ‘We’ vs. ‘They’ Read More
people interact around oversized smartphone, illustration - Credit: aurielaki / Shutterstock
Computing & Technology / Articles

Two Paths for Digital Disability Law

Digital accessibility has its roots in a decades-long legal movement.

Two Paths for Digital Disability Law Read More
numbered frames around the heads of indefinite figures, illustration - Credit: Varuna
Computing & Technology / Articles

The Troubling Future for Facial Recognition Software

There is promising, if somewhat slow, progress on making facial recognition software less biased.

The Troubling Future for Facial Recognition Software Read More
the words 'Raise Your Voice' in the shape of a bullhorn - Credit: Shutterstock
Computing & Technology / Articles

A Call to Action

We cannot put the genii back in the bottle, but we can ensure human control.

A Call to Action Read More
CMU Professor Jason Hong - Credit: Carnegie Mellon University
Computing & Technology / Articles

Modern Tech Can’t Shield Your Secret Identity

Superheroes worry about having their identities revealed, while the rest of us in the real world worry about surveillance technologies and how they can be easily abused.

Modern Tech Can’t Shield Your Secret Identity Read More
3D sound wave, illustration - Credit: Getty Images
Computing & Technology / Articles

Raising Robovoices

“If you just chain together automatic transcription, translation, and speech synthesis, you end up accumulating too many errors.”

Raising Robovoices Read More
Trustworthy Autonomous Systems Hub logo on blue - Credit: UKRI TAS Hub
Computing & Technology / Articles

Trust, Regulation, and Human-in-the-Loop AI: within the European region

The E.U. is an early mover in the race to regulate AI, and with the draft E.U. AI Act, it has adopted an assurance-based regulatory environment using yet-to-be-defined AI assurance standards.

Trust, Regulation, and Human-in-the-Loop AI: within the European region Read More
circuit electronics on a human head, illustration - Credit: Getty Images
Computing & Technology / Articles

Technology’s Impact on Morality

Technology without morality is barbarous; morality without technology is impotent.—Freeman Dyson

Technology’s Impact on Morality Read More
digital twins concept - Ms Tech | Getty
Computing & Technology / Articles

How AI digital twins help weather the world’s supply chain nightmare

Just-in-time shipping is dead. Long live supply chains stress-tested with AI digital twins.

How AI digital twins help weather the world’s supply chain nightmare Read More
(iStock)
Computing & Technology / Articles

U.S. to triple operational weather and climate supercomputing capacity

Computing upgrade paves way for planned model improvements.

U.S. to triple operational weather and climate supercomputing capacity Read More
Sam Zeloof holding his second generation computer chip up to a magnifying glass in his garage. August 2021. - Photograph: Sam Kang
Computing & Technology / Articles

This 22-Year-Old Builds Chips in His Parents’ Garage

Sam Zeloof combines 1970s-era machines with homemade designs. His creations show what’s possible for small-scale silicon tinkerers.

This 22-Year-Old Builds Chips in His Parents’ Garage Read More
Silhouette of woman typing on laptop - Getty
Articles / Computing & Technology

How Facebook and Google fund global misinformation

The tech giants are paying millions of dollars to the operators of clickbait pages, bankrolling the deterioration of information ecosystems around the world.

How Facebook and Google fund global misinformation Read More
3D drone satellite view of Pentagon building Washington DC USA - Ms Tech | Getty
Computing & Technology / Articles

The Department of Defense is issuing AI ethics guidelines for tech contractors

The controversy over Project Maven shows the department has a serious trust problem. This is an attempt to fix that.

The Department of Defense is issuing AI ethics guidelines for tech contractors Read More
Logo - Defense Innovation Unit (DIU)
Computing & Technology / Articles

Responsible AI Guidelines

DIU launched a strategic initiative in March 2020 to implement the DoD’s Ethical Principles for Artificial Intelligence (AI) into its commercial prototyping and acquisition programs.

Responsible AI Guidelines Read More
Logo - U.S. Department of Defense
Computing & Technology / News & Information

DOD Adopts Ethical Principles for Artificial Intelligence

The U.S. Department of Defense officially adopted a series of ethical principles for the use of Artificial Intelligence today following recommendations provided to Secretary of Defense Dr. Mark T. Esper by the Defense Innovation Board last October.

DOD Adopts Ethical Principles for Artificial Intelligence Read More

Posts navigation

Previous 1 2 3 … 17 Next

sal·ma·gun·di

(săl′mə-gŭn′dē)

n. pl. sal·ma·gun·dis 1. A salad of chopped meat, anchovies, eggs, and assorted fruits and vegetables, often arranged in rows on lettuce and served with vinegar and oil. 2. A mixture or assortment; a potpourri.

A salad of some of the things that interest me most.

About the name:

Salmagundi & Solomon Grundy »

Search

Featured Books »

Books of interest to Internet Salmagundi readers. (Yes, I have read each of these.)

Recent Posts

  • Considering the Impact of Technology on Society
  • Split Your Overwhelmed Teams
  • Mapping the Privacy Landscape for Central Bank Digital Currencies
  • A Turning Point for Cyber Insurance
  • CISA Cybersecurity Strategic Plan
  • Mapping California’s ‘Zombie’ Forests
  • CISA Develops Factsheet for Free Tools for Cloud Environments
  • ‘An Act of War’: Inside America’s Silicon Blockade Against China
  • The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
  • The inside story of New York City’s 34-year-old social network, ECHO

Pages Displaying ALL Posts in a Category

  • Computing & Technology
  • Cybersecurity
  • Climate
  • Weather | Snow | Utah
  • Web Resources

Reference

• Dictionaries, Glossaries and Other Resources
• Glossary of Terms (Tag Terms)
• Links

Categories (Number of Articles in each)

  • — Broad Topics (657)
    • Climate (23)
    • Computing & Technology (327)
    • CyberSecurity (234)
    • Web Resources (39)
      • – Nielsen Norman Group articles (15)
    • Weather | Snow | Utah (38)
      • – WSU Resources (9)
    • Street Art (3)
  • — Form Types (640)
    • Articles (546)
    • Books, Reports, Films & Images (67)
    • News & Information (30)
    • Organizations (4)
  • — General (1)

List of Major Tags

(Count of 5 or more articles, alpha-sorted.)
  • Artificial Intelligence (55)
  • Artificial Intelligence Research (7)
  • Avalanche Awesomeness (5)
  • Avalanche Control & Mitigation (5)
  • Avalanche Education (8)
  • Avalanche Photos (5)
  • Avalanche Safety (5)
  • Backcountry Travel & Safety (11)
  • Bellingcat (6)
  • China (26)
  • CISA (CyberSecurity & Infrastructure Security Agency) (7)
  • CISA Security Tip (10)
  • Classics (10)
  • Coding (10)
  • Computer Chip Manufacture (7)
  • Computer Crimes (5)
  • Computer Science Education (12)
  • Computer Security (17)
  • Coronavirus-Covid19 (15)
  • Cryptography (10)
  • CSS (6)
  • Cyber Crime (17)
  • CyberSecurity (11)
  • CyberSecurity News (5)
  • Cybersecurity Research and Development (6)
  • Cyber Warfare (15)
  • Deep Learning (DL) (5)
  • Disinformation (Coordinated Inauthentic Behavior) (13)
  • Encryption (7)
  • Espionage – Cyber (11)
  • Ethics (31)
  • Ethics of AI (18)
  • Facebook (15)
  • Facebook – Social Aspects (5)
  • Facial Recognition (5)
  • Fiber-optic Cable (7)
  • Geopolitics (9)
  • Google (Firm) (7)
  • Government Policy (12)
  • Government Regulation (11)
  • Guidance (17)
  • Hacker Culture (5)
  • Hackers & Hacking (31)
  • Hacking for Hire (9)
  • High Performance Computing (6)
  • Historical (8)
  • History – Computing (22)
  • History – Internet (15)
  • History – Silicon Valley (8)
  • How To (10)
  • HTML (6)
  • Human Psychology (6)
  • Internet – Government Policy (8)
  • Internet Access (6)
  • Internet Censorship (10)
  • Internet Connectivity (6)
  • Internet of Things (IoT) (5)
  • Internet Safety (6)
  • Internet Security (5)
  • Iran (6)
  • IT – Technological Innovation (15)
  • Law & Policy (6)
  • Machine Learning (12)
  • Malware (10)
  • Misinformation (5)
  • Mobile Device Security (5)
  • National Security (US) (15)
  • National Security Agency (5)
  • NNg-UX (14)
  • North Korea (9)
  • NSO (13)
  • Online Advertising (6)
  • Open Source Intelligence (OSINT) (13)
  • Opinion & Perspective (6)
  • Passwords (8)
  • Pegasus (7)
  • Popular Culture (5)
  • Privacy (28)
  • Privacy & Data Protection (10)
  • Privacy & Personal Information (12)
  • Propaganda (8)
  • Quantum Computing (5)
  • Ransomware (8)
  • Resources (6)
  • Russia (42)
  • Security (9)
  • Security Guidance (8)
  • Security Tips (6)
  • Series: WaPo – Behind the Firewall (6)
  • Social Control (7)
  • Social Interest (6)
  • Social Media (27)
  • SolarWinds (5)
  • Spyware (8)
  • Supply Chain Attack (5)
  • Surveillance (5)
  • Surveillance – Electronic (12)
  • Surveillance – Mass (6)
  • Surveillance – Online (13)
  • Surveillance Capitalism (6)
  • Technological Achievement (8)
  • Technology & Politics (6)
  • Technology & Society (8)
  • Technology & War (5)
  • Technology Policy (8)
  • Trustworthy Systems (5)
  • Ukraine (29)
  • Understanding Your World (6)
  • User eXperience (6)
  • Weather Phenomena (6)
  • Web Accessibility (6)
  • Web Design (8)
  • Web Development (5)
  • Web Usability (7)
  • Zero-Click / Interactionless Attacks (6)
  • Zero-Day Exploits (5)

Beyond Computing

D-Day and Clinton C. Gardner

LIST OF ALL TAGS BY CATEGORY »

Listing of all tags included in this site, segregated by categories.

About Internet Salmagundi

Internet Salmagundi is a project of Wallace Web Design.

About Me – Contact Me
Site Policies

Copyright © 2020-23 Wallace Web Design, LLC

 

Featured Books

Book Cover - The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations"
Book Cover - The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime"
Book Cover - A Hacker's Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back"
Book Cover - A Biography of the Pixel"
Book Cover - Steve Jobs"
Book Cover - We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News"
Book Cover - In the Plex: How Google Thinks, Works, and Shapes Our Lives"
Book Cover - The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution"
Book Cover - The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage"
Book Cover - A New History of Modern Computing: How the computer became universal"
Book Cover - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon"
Book Cover - Hackers: Heroes of the Computer Revolution"
Book Cover - Electronic Life: How to Think About Computers by Michael Crichton"
Book Cover - We Have Root: Even More Advice from Schneier on Security"
Book cover: Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Ed."
Book Cover - Facebook: The Inside Story by Steven Levy"
Book Cover - Dark Mirror: Edward Snowden and the American Surveillance State"
Book Cover - The Hacker and the State Cyber Attacks and the New Normal of Geopolitics"
Book Cover - Tools and Weapons: The Promise and the Peril of the Digital Age"
Book Cover - The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power"
Book Cover - AI Superpowers: China, Silicon Valley, and the New World Order"
Book Cover: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers"
Book Cover: Mindf*ck: Cambridge Analytica and the Plot to Break America"
Book Cover- Permanent Record"
Book Cover - The Perfect Weapon"
Book Cover - Dawn of the Code War"
Book Cover - Zucked"
Book Cover - Click Here to Kill Everybody: Security and Survival in a Hyper-connected World by Bruce Schneier"
Book Cover - Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier"
Book Cover - Beyond Fear: Thinking Sensibly about Security in an Uncertain World by Bruce Schneier"
Book Cover - Secrets & Lies: Digital Security in a Networked World by Bruce Schneier"
Copyright © 2020-2023 Wallace Web Design, LLC